{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:29:32Z","timestamp":1740180572559,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals in response to user commands. VPAs extend their functions through third-party voice apps, thereby attracting more users to use VPA-equipped products. Previous studies demonstrate vulnerabilities in the certification, installation, and usage of these third-party voice apps. However, these studies focus on individual apps. To the best of our knowledge, there is no prior research that explores the correlations among voice apps.Voice apps represent a new type of applications that interact with users mainly through a voice user interface instead of a graphical user interface, requiring a distinct approach to analysis. In this study, we present a novel voice app similarity analysis approach to analyze voice apps in the market from a new perspective. Our approach, called SkillSim, detects similarities among voice apps (i.e. skills) based on two dimensions: text similarity and structure similarity. SkillSim measures 30,000 voice apps in the Amazon skill market and reveals that more than 25.9% have at least one other skill with a text similarity greater than 70%. Our analysis identifies several factors that contribute to a high number of similar skills, including the assistant development platforms and their limited templates. Additionally, we observe interesting phenomena, such as developers or platforms creating multiple similar skills with different accounts for purposes such as advertising. Furthermore, we also find that some assistant development platforms develop multiple similar but non-compliant skills, such as requesting user privacy in a non-compliance way, which poses a security risk. Based on the similarity analysis results, we have a deeper understanding of voice apps in the mainstream market.<\/jats:p>","DOI":"10.1186\/s42400-023-00150-3","type":"journal-article","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T02:01:47Z","timestamp":1688176907000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SkillSim: voice apps similarity detection"],"prefix":"10.1186","volume":"6","author":[{"given":"Zhixiu","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-9918","authenticated-orcid":false,"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Guozhu","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,1]]},"reference":[{"key":"150_CR1","doi-asserted-by":"publisher","first-page":"86121","DOI":"10.1109\/ACCESS.2019.2918202","volume":"7","author":"QU Ain","year":"2019","unstructured":"Ain QU, Butt WH, Anwar MW, Azam F, Maqbool B (2019) A systematic review on code clone detection. IEEE Access 7:86121\u201386144. https:\/\/doi.org\/10.1109\/ACCESS.2019.2918202","journal-title":"IEEE Access"},{"key":"150_CR2","doi-asserted-by":"publisher","unstructured":"Akram J, Shi Z, Mumtaz M, Luo P (2018) Droidcc: A scalable clone detection approach for android applications to detect similarity at source code level. In: Reisman S, Ahamed SI, Demartini C, Conte TM, Liu L, Claycomb WR, Nakamura M, Tovar E, Cimato S, Lung C, Takakura H, Yang J, Akiyama T, Zhang Z, Hasan K (eds.) 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1, pp. 100\u2013105. https:\/\/doi.org\/10.1109\/COMPSAC.2018.00021","DOI":"10.1109\/COMPSAC.2018.00021"},{"key":"150_CR3","unstructured":"Amazon Skill Numbers (2019). https:\/\/voicebot.ai\/2019\/10\/01\/amazon-alexa-has-100k-skills-but-momentum-slows-globally-here-is-the-breakdown-by-country"},{"key":"150_CR4","unstructured":"Amazon: Amazon Certification Requirements (2022a). https:\/\/developer.amazon.com\/docs\/custom-skills\/certification-requirements-for-custom-skills.html"},{"key":"150_CR5","unstructured":"Amazon: Amazon Certification Requirements (2022b). https:\/\/developer.amazon.com\/zh\/docs\/custom-skills\/request-customer-contact-information-for-use-in-your-skill.html"},{"key":"150_CR6","unstructured":"Amazon: Amazon Certification Requirements (2022c). https:\/\/developer.amazon.com\/en-US\/docs\/alexa\/devconsole\/about-skill-metrics.html"},{"key":"150_CR7","unstructured":"Amazon: Third-party tools list recommended by Amazon (2022d). https:\/\/developer.amazon.com\/en-US\/alexa\/alexa-skills-kit\/get-deeper\/dev-tools-skill-management-api\/tools-design"},{"issue":"9","key":"150_CR8","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TSE.2007.70725","volume":"33","author":"S Bellon","year":"2007","unstructured":"Bellon S, Koschke R, Antoniol G, Krinke J, Merlo E (2007) Comparison and evaluation of clone detection tools. IEEE Trans. Softw. Eng. 33(9):577\u2013591. https:\/\/doi.org\/10.1109\/TSE.2007.70725","journal-title":"IEEE Trans. Softw. Eng."},{"key":"150_CR9","doi-asserted-by":"publisher","unstructured":"Broder A.Z (1997) On the resemblance and containment of documents. In: Carpentieri B, Santis AD, Vaccaro U, Storer JA (eds.) Compression and Complexity of SEQUENCES 1997, Positano, Amalfitan Coast, Salerno, Italy, June 11-13, 1997, Proceedings, pp 21\u201329. https:\/\/doi.org\/10.1109\/SEQUEN.1997.666900","DOI":"10.1109\/SEQUEN.1997.666900"},{"key":"150_CR10","doi-asserted-by":"publisher","unstructured":"Cheng L, Wilson C, Liao S, Young J, Dong D, Hu H (2020) Dangerous skills got certified: measuring the trustworthiness of skill certification in voice personal assistant platforms. In: Ligatti J, Ou X, Katz J, Vigna G (eds.) CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 1699\u20131716. https:\/\/doi.org\/10.1145\/3372297.3423339","DOI":"10.1145\/3372297.3423339"},{"key":"150_CR11","doi-asserted-by":"publisher","unstructured":"Chen K, Liu P, Zhang Y (2014) Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: Jalote P, Briand LC, van\u00a0der Hoek A (eds.) 36th International Conference on Software Engineering, ICSE \u201914, Hyderabad, India - May 31 - June 07, 2014, pp. 175\u2013186. https:\/\/doi.org\/10.1145\/2568225.2568286","DOI":"10.1145\/2568225.2568286"},{"key":"150_CR12","unstructured":"Chen Y, Yuan X, Zhang J, Zhao Y, Zhang S, Chen K, Wang X (2020) Devil\u2019s whisper: a general approach for physical adversarial attacks against commercial black-box speech recognition devices. In: Capkun, S., Roesner, F. (eds.) 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 2667\u20132684 . https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-yuxuan"},{"key":"150_CR13","unstructured":"Datasketch (2022). https:\/\/github.com\/ekzhu\/datasketch"},{"key":"150_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3129116","author":"J Edu","year":"2021","unstructured":"Edu J, Ferrer Aran X, Such J, Suarez-Tangil G (2021) Skillvet: automated traceability analysis of amazon alexa skills. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2021.3129116","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"150_CR15","unstructured":"Gensim (2022). https:\/\/radimrehurek.com\/gensim"},{"key":"150_CR16","unstructured":"Guo Z, Lin Z, Li P, Chen K (2020) Skillexplorer: Understanding the behavior of skills in large scale. In: Capkun, S., Roesner, F. (eds.) 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 2649\u20132666"},{"key":"150_CR17","unstructured":"Guo Z, Lin Z, Li P, Chen K (2020) Skillexplorer: understanding the behavior of skills in large scale. In: USENIX Security Symposium"},{"key":"150_CR18","doi-asserted-by":"publisher","unstructured":"Indyk P, Motwani R (1998) Approximate nearest neighbors: Towards removing the curse of dimensionality. In: Vitter JS (ed.) Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998, pp 604\u2013613. https:\/\/doi.org\/10.1145\/276698.276876","DOI":"10.1145\/276698.276876"},{"issue":"2","key":"150_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard P (1912) The distribution of the flora in the alpine zone. New Phytol 11(2):37\u201350","journal-title":"New Phytol"},{"key":"150_CR20","unstructured":"Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M (2018) Skill squatting attacks on amazon alexa. In: Enck, W., Felt, A.P. (eds.) 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, pp. 33\u201347. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/kumar"},{"key":"150_CR21","doi-asserted-by":"publisher","DOI":"10.1145\/3539609","author":"T Le","year":"2022","unstructured":"Le T, Huang DY, Apthorpe N, Tian Y (2022) Skillbot: identifying risky content for children in alexa skills. ACM Trans Internet Technol. https:\/\/doi.org\/10.1145\/3539609","journal-title":"ACM Trans Internet Technol"},{"key":"150_CR22","unstructured":"Le Q.V, Mikolov T (2014) Distributed representations of sentences and documents. In: Proceedings of the 31th International Conference on Machine Learning, ICML 2014, Beijing, China, 21-26 June 2014. JMLR Workshop and Conference Proceedings, vol. 32, pp. 1188\u2013119. http:\/\/proceedings.mlr.press\/v32\/le14.html"},{"key":"150_CR23","doi-asserted-by":"crossref","unstructured":"Lentzsch C, Shah S.J, Andow B, Degeling M, Das A, Enck W (2021) Hey alexa, is this skill safe?: Taking a closer look at the alexa skill ecosystem. In: 28th Annual Network and Distributed System Security Symposium, NDSS 2021, Virtually, February 21-25, 2021. https:\/\/www.ndss-symposium.org\/ndss-paper\/hey-alexa-is-this-skill-safe-taking-a-closer-look-at-the-alexa-skill-ecosystem\/","DOI":"10.14722\/ndss.2021.23111"},{"key":"150_CR24","doi-asserted-by":"publisher","unstructured":"Liao S, Wilson C, Cheng L, Hu H, Deng H (2020) Measuring the effectiveness of privacy policies for voice assistant applications. In: ACSAC \u201920: Annual Computer Security Applications Conference, Virtual Event \/ Austin, TX, USA, 7-11 December, 2020, pp. 856\u2013869. https:\/\/doi.org\/10.1145\/3427228.3427250","DOI":"10.1145\/3427228.3427250"},{"key":"150_CR25","doi-asserted-by":"crossref","unstructured":"Li S, Bu L, Bai G, Guo Z, Chen K, Wei H (2022) Vitas: Guided model-based vui testing of vpa apps. In: 37th IEEE\/ACM international conference on automated software engineering, pp 1\u201312","DOI":"10.1145\/3551349.3556957"},{"issue":"6","key":"150_CR26","first-page":"1499","volume":"13","author":"ME Manaa","year":"2018","unstructured":"Manaa ME, Abdulameer G (2018) Web documents similarity using k-shingle tokens and minhash technique. J Eng Appl Sci 13(6):1499\u20131505","journal-title":"J Eng Appl Sci"},{"key":"150_CR51","doi-asserted-by":"crossref","unstructured":"Meng G, Xue Y, Xu Z, Liu Y, Zhang J, Narayanan A (2016) Semantic modelling of android malware for effective malware comprehension, detection, and classification. In: Proceedings of the 25th International Symposium on Software Testing and Analysis, pp. 306\u2013317","DOI":"10.1145\/2931037.2931043"},{"issue":"7","key":"150_CR52","doi-asserted-by":"publisher","first-page":"1944","DOI":"10.1109\/TIFS.2018.2889924","volume":"14","author":"G Meng","year":"2018","unstructured":"Meng G, Patrick M, Xue Y, Liu Y, Zhang J (2018) Securing android app markets via modeling and predicting malware spread between markets. IEEE Trans Inf Forensics Secur 14(7):1944\u20131959","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"150_CR53","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s42400-018-0006-7","volume":"1","author":"G Meng","year":"2018","unstructured":"Meng G, Feng R, Bai G, Chen K, Liu Y (2018) DroidEcho: an in-depth dissection of malicious behaviors in Android applications. Cybersecurity 1:4. https:\/\/doi.org\/10.1186\/s42400-018-0006-7","journal-title":"Cybersecurity"},{"key":"150_CR27","unstructured":"Mikolov T, Chen K, Corrado G, Dean J (2013) Efficient estimation of word representations in vector space. In: Bengio Y, LeCun Y (eds.) 1st International Conference on Learning Representations, ICLR 2013, Scottsdale, Arizona, USA, May 2-4, 2013, Workshop Track Proceedings. arXiv:1301.3781"},{"key":"150_CR28","doi-asserted-by":"publisher","unstructured":"Misu M.R.H, Sakib K (2017) Interface driven code clone detection. In: Lv J, Zhang HJ, Hinchey M, Liu X (eds.) 24th Asia-Pacific Software Engineering Conference, APSEC 2017, Nanjing, China, December 4-8, 2017, pp. 747\u2013748. https:\/\/doi.org\/10.1109\/APSEC.2017.97","DOI":"10.1109\/APSEC.2017.97"},{"key":"150_CR29","doi-asserted-by":"publisher","unstructured":"Misu M.R.H, Satter A, Sakib K (2017) An exploratory study on interface similarities in code clones. In: 24th Asia-Pacific Software Engineering Conference Workshops, APSEC Workshops 2017, Nanjing, China, December 4-8, 2017, pp. 126\u2013133. https:\/\/doi.org\/10.1109\/APSECW.2017.24","DOI":"10.1109\/APSECW.2017.24"},{"key":"150_CR30","doi-asserted-by":"publisher","unstructured":"Nakamura Y, Choi E, Yoshida N, Haruna S, Inoue K (2016) Towards detection and analysis of interlanguage clones for multilingual web applications. In: 10th International Workshop on Software Clones, IWSC@SANER 2016, Osaka, Japan, March 15, 2016, pp. 17\u201318. https:\/\/doi.org\/10.1109\/SANER.2016.55","DOI":"10.1109\/SANER.2016.55"},{"key":"150_CR31","unstructured":"NLTK (2022). https:\/\/www.nltk.org"},{"key":"150_CR32","doi-asserted-by":"publisher","first-page":"11841","DOI":"10.1109\/ACCESS.2017.2707539","volume":"5","author":"J Pati","year":"2017","unstructured":"Pati J, Kumar B, Manjhi D, Shukla KK (2017) A comparison among arima, bp-nn, and MOGA-NN for software clone evolution prediction. IEEE Access 5:11841\u201311851. https:\/\/doi.org\/10.1109\/ACCESS.2017.2707539","journal-title":"IEEE Access"},{"key":"150_CR33","doi-asserted-by":"publisher","unstructured":"Ragkhitwetsagul C, Krinke J (2017) Using compilation\/decompilation to enhance clone detection. In: Kraft NA, Godfrey MW, Sajnani H (eds.) 11th IEEE International Workshop on Software Clones, IWSC 2017, Klagenfurt, Austria, February 21, 2017, pp. 8\u201314. https:\/\/doi.org\/10.1109\/IWSC.2017.7880502","DOI":"10.1109\/IWSC.2017.7880502"},{"key":"150_CR34","doi-asserted-by":"publisher","unstructured":"Sajnani H, Saini V, Svajlenko J, Roy C.K, Lopes C.V (2016) Sourcerercc: scaling code clone detection to big-code. In: Dillon LK, Visser W, Williams LA (eds.) Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016, pp. 1157\u20131168. https:\/\/doi.org\/10.1145\/2884781.2884877","DOI":"10.1145\/2884781.2884877"},{"key":"150_CR35","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.eswa.2017.12.040","volume":"97","author":"A Sheneamer","year":"2018","unstructured":"Sheneamer A, Roy S, Kalita J (2018) A detection framework for semantic code clones and obfuscated code. Expert Syst Appl 97:405\u2013420. https:\/\/doi.org\/10.1016\/j.eswa.2017.12.040","journal-title":"Expert Syst Appl"},{"key":"150_CR36","doi-asserted-by":"publisher","unstructured":"Sheneamer A, Kalita J (2016) Semantic clone detection using machine learning. In: 15th IEEE International Conference on Machine Learning and Applications, ICMLA 2016, Anaheim, CA, USA, December 18-20, 2016, pp. 1024\u20131028. https:\/\/doi.org\/10.1109\/ICMLA.2016.0185","DOI":"10.1109\/ICMLA.2016.0185"},{"key":"150_CR37","unstructured":"spaCy (2022). https:\/\/spacy.io"},{"key":"150_CR38","unstructured":"SRLabs: Smart Spies (2022). https:\/\/srlabs.de\/bites\/smart-spies"},{"key":"150_CR39","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.compeleceng.2017.05.011","volume":"61","author":"R Tekchandani","year":"2017","unstructured":"Tekchandani R, Bhatia RK, Singh M (2017) Code clone genealogy detection on e-health system using hadoop. Comput. Electr. Eng. 61:15\u201330. https:\/\/doi.org\/10.1016\/j.compeleceng.2017.05.011","journal-title":"Comput. Electr. Eng."},{"key":"150_CR40","doi-asserted-by":"publisher","unstructured":"Vislavski T, Rakic G, Cardozo N, Budimac Z (2018) LICCA: A tool for cross-language clone detection. In: Oliveto R, Penta MD, Shepherd DC (eds.) 25th International Conference on Software Analysis, Evolution and Reengineering, SANER 2018, Campobasso, Italy, March 20-23, 2018, pp. 512\u2013516. https:\/\/doi.org\/10.1109\/SANER.2018.8330250","DOI":"10.1109\/SANER.2018.8330250"},{"issue":"3","key":"150_CR41","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1145\/3478101","volume":"5","author":"D Wang","year":"2021","unstructured":"Wang D, Chen K, Wang W (2021) Demystifying the vetting process of voice-controlled skills on markets. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(3):130\u2013113028. https:\/\/doi.org\/10.1145\/3478101","journal-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."},{"key":"150_CR42","doi-asserted-by":"publisher","unstructured":"Wang P, Svajlenko J, Wu Y, Xu Y, Roy C.K (2018) Ccaligner: a token based large-gap clone detector. In: Chaudron M, Crnkovic I, Chechik M, Harman M (eds.) Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018, pp. 1066\u20131077. https:\/\/doi.org\/10.1145\/3180155.3180179","DOI":"10.1145\/3180155.3180179"},{"issue":"3","key":"150_CR43","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong K, Kwok K (2008) Interpreting TF-IDF term weights as making relevance decisions. ACM Trans. Inf. Syst. 26(3):13\u201311337. https:\/\/doi.org\/10.1145\/1361684.1361686","journal-title":"ACM Trans. Inf. Syst."},{"key":"150_CR44","doi-asserted-by":"publisher","unstructured":"Xue H, Venkataramani G, Lan T (2018) Clone-hunter: accelerated bound checks elimination via binary code clone detection. In: Gottschlich J, Cheung A (eds.) Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming Languages, MAPL@PLDI 2018, Philadelphia, PA, USA, June 18-22, 2018, pp. 11\u201319. https:\/\/doi.org\/10.1145\/3211346.3211347","DOI":"10.1145\/3211346.3211347"},{"key":"150_CR45","doi-asserted-by":"publisher","unstructured":"Yang Y, Ren Z, Chen X, Jiang H (2018) Structural function based code clone detection using a new hybrid technique. In: Reisman S, Ahamed SI, Demartini C, Conte TM, Liu L, Claycomb WR, Nakamura M, Tovar E, Cimato S, Lung C, Takakura H, Yang J, Akiyama T, Zhang Z, Hasan K (eds.) 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1, pp. 286\u2013291. https:\/\/doi.org\/10.1109\/COMPSAC.2018.00045","DOI":"10.1109\/COMPSAC.2018.00045"},{"key":"150_CR46","unstructured":"Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang X, Gunter C.A (2018) Commandersong: A systematic approach for practical adversarial voice recognition. In: Enck, W., Felt, A.P. (eds.) 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, pp. 49\u201364. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yuan-xuejing"},{"key":"150_CR47","doi-asserted-by":"publisher","unstructured":"Yuki Y, Higo Y, Kusumoto S (2017) A technique to detect multi-grained code clones. In: Kraft, N.A., Godfrey, M.W., Sajnani, H. (eds.) 11th IEEE International Workshop on Software Clones, IWSC 2017, Klagenfurt, Austria, February 21, 2017, pp. 54\u201360. https:\/\/doi.org\/10.1109\/IWSC.2017.7880510","DOI":"10.1109\/IWSC.2017.7880510"},{"key":"150_CR48","doi-asserted-by":"publisher","unstructured":"Yu D, Wang J, Wu Q, Yang J, Wang J, Yang W, Yan W (2017) Detecting java code clones with multi-granularities based on bytecode. In: Reisman S, Ahamed SI, Demartini C, Conte TM, Liu L, Claycomb WR, Nakamura M, Tovar E, Cimato S, Lung C, Takakura H, Yang J, Akiyama T, Zhang Z, Hasan K (eds.) 41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1, pp. 317\u2013326. https:\/\/doi.org\/10.1109\/COMPSAC.2017.104","DOI":"10.1109\/COMPSAC.2017.104"},{"key":"150_CR49","doi-asserted-by":"publisher","unstructured":"Zhang N, Mi X, Feng X, Wang X, Tian Y, Qian F (2019a) Dangerous skills: understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1381\u20131396. https:\/\/doi.org\/10.1109\/SP.2019.00016","DOI":"10.1109\/SP.2019.00016"},{"key":"150_CR50","doi-asserted-by":"crossref","unstructured":"Zhang Y, Xu L, Mendoza A, Yang G, Chinprutthiwong P, Gu G (2019b) Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. https:\/\/www.ndss-symposium.org\/ndss-paper\/life-after-speech-recognition-fuzzing-semantic-misinterpretation-for-voice-assistant-applications\/","DOI":"10.14722\/ndss.2019.23525"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00150-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00150-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00150-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T02:02:20Z","timestamp":1688176940000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00150-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,1]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["150"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00150-3","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2023,7,1]]},"assertion":[{"value":"27 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"13"}}